๐Ÿ” CVE Alert

CVE-2024-7923

CRITICAL 9.8

Puppet-pulpcore: an authentication bypass vulnerability exists in pulpcore

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

CWE CWE-287
Published Sep 4, 2024
Last Updated Nov 11, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new critical vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Versions

Red Hat / Red Hat Satellite 6.13 for RHEL 8
All versions affected
Red Hat / Red Hat Satellite 6.13 for RHEL 8
All versions affected
Red Hat / Red Hat Satellite 6.14 for RHEL 8
All versions affected
Red Hat / Red Hat Satellite 6.14 for RHEL 8
All versions affected
Red Hat / Red Hat Satellite 6.15 for RHEL 8
All versions affected
Red Hat / Red Hat Satellite 6.15 for RHEL 8
All versions affected
Red Hat / Red Hat Satellite 6.16 for RHEL 8
All versions affected
Red Hat / Red Hat Satellite 6.16 for RHEL 8
All versions affected
Red Hat / Red Hat Satellite 6.16 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.16 for RHEL 9
All versions affected
Red Hat / Red Hat Update Infrastructure 4 for Cloud Providers
All versions affected
Red Hat / Red Hat Update Infrastructure 4 for Cloud Providers
All versions affected
Red Hat / Red Hat Update Infrastructure 4 for Cloud Providers
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:6335 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:6336 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:6337 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:8906 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-7923 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2305718